SlideShare a Scribd company logo
DATA COMMUNICATION
AND
NETWORKING
How are we in the meeting?
 Our team behave well
 Our team were curious
 Our team have cooperation
 Our team gave suggestions
 Our team share knowledge
 Our team was guided well
 Our team gave understanding and considerations
 Our team assess issues or inquiries right away
 Our team was prepared to listen every meeting
What are challenges and difficulties we face in the activity?
 Unstable Internet connection
 Factors cause by the typhoon
 Frequent changes in schedule
 Having little to no Idea about the topic
 Gadgets malfunctions
Did we succeed?
Yes Definitely
Why?
We've worked as a team not just in discussion but in participation
There’s a person who were assigned to discuss
Someone to take screenshots for documentation
Someone to write document and analyze the results
Someone to make the presentation based on the documentation
How Did We
Configure A
network?
 Open Cisco Packet
tracer
 Login to start
 First thing is to place all
devices needed in a
network
 Connect all devices via
straight through
 Choose a pc to were
you want to access
the routers CLI, and
connect it to the
console port via cable
 Access the
Command line
interface by opening
that pc’s terminal
COMMANDS USED IN NETWORK CONFIGURATION
• Enable We used this command to enter the privilege EXEC
mode
• Disable To Exit all the way to User EXEC mode
• Exit To Exit one mode at a time
• Configure terminal To Enter Global Configuration mode
• Hostname “ ” Change name of the router (host)
• Banner motd $ $ Show message or warning before logging in
• Enable secret “ ” Challenge a password upon enabling the Privilege
EXEC mode
• Line console 0 We use this specific mode to access the command to
set password upon login
• Line vty 0 4 We used this specific mode to access commands to
set password for those who will attempt to connect
remotely
• Service password-encryption Encrypts all passwords
COMMANDS USED IN NETWORK CONFIGURATION
• Password “ ” login Used in specific mode to set passwords upon log in
• Show running-config To show the changes in a current state of
configuration
• Show startup-config Shows the initial configuration of the system
• Copy running-config startup-config Copies the changes in the running
configuration to the startup-configuration
COMMANDS USED IN NETWORK CONFIGURATION
HERE ARE THE PROPER STEPS TO COMPLETE
NETWORK CONFIGURATION:
Setting Router Gateway Default
Router>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface GigabitEthernet0/0/0
Router(config-if)#ip address 1.1.1.0 255.0.0.0
Router(config-if)#ip address 1.1.1.0 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0/1
Router(config-if)#ip address 2.2.2.0 255.0.0.0
Router(config-if)#ip address 2.2.2.0 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)
How to Set Host Name
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname grp7-R1-bldg1
grp7-R1-bldg1(config)#exit
grp7-R1-bldg1#
%SYS-5-CONFIG_I: Configured from console by console
grp7-R1-bldg1#disable
grp7-R1-bldg1>exit
Change banner
grp7-R1-bldg1>enable
grp7-R1-bldg1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
grp7-R1-bldg1(config)#banner motd $Authorize personnel Only$
grp7-R1-bldg1(config)#banner motd $
Enter TEXT message. End with the character '$'.
============================================================
***************Authrized Person Only************************
============================================================$
grp7-R1-bldg1(config)#exit
grp7-R1-bldg1#
%SYS-5-CONFIG_I: Configured from console by console
grp7-R1-bldg1#disable
grp7-R1-bldg1>exit
Make password upon entry to user mode
============================================================
***************Authorized Person Only************************
============================================================
grp7-R1-bldg1>enable
Password:
grp7-R1-bldg1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
grp7-R1-bldg1(config)#line console 0
grp7-R1-bldg1(config-line)#password 0000
grp7-R1-bldg1(config-line)#login
grp7-R1-bldg1(config-line)#exit
grp7-R1-bldg1(config)#exit
grp7-R1-bldg1#
%SYS-5-CONFIG_I: Configured from console by console
grp7-R1-bldg1#disable
grp7-R1-bldg1>exit
Make password for remote access
============================================================
***************Authorized Person Only************************
============================================================
User Access Verification
Password:
grp7-R1-bldg1>enable
Password:
grp7-R1-bldg1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
grp7-R1-bldg1(config)#line vty 0 4
grp7-R1-bldg1(config-line)#password 0000
grp7-R1-bldg1(config-line)#login
grp7-R1-bldg1(config-line)#exit
grp7-R1-bldg1(config)#exit
grp7-R1-bldg1#
%SYS-5-CONFIG_I: Configured from console by console
grp7-R1-bldg1#disable
grp7-R1-bldg1>exit
Encrypt login (user EXEC) password and Remote access
password
============================================================
***************Authorized Person Only************************
============================================================
User Access Verification
Password:
grp7-R1-bldg1>enable
Password:
grp7-R1-bldg1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
grp7-R1-bldg1(config)#service password-encryption
grp7-R1-bldg1(config)#exit
grp7-R1-bldg1#
%SYS-5-CONFIG_I: Configured from console by console
grp7-R1-bldg1#disable
grp7-R1-bldg1>exit
Thank you!

More Related Content

Similar to Data-communication-and-networking.pptx

Day 5.3 configuration of router
Day 5.3 configuration of routerDay 5.3 configuration of router
Day 5.3 configuration of router
CYBERINTELLIGENTS
 
Switches lets expand our networks
Switches lets expand our networksSwitches lets expand our networks
Switches lets expand our networks
Mohak Kaushik
 
Basic Configurations on Router
Basic Configurations on RouterBasic Configurations on Router
Basic Configurations on Router
Mansour Naslcheraghi
 
lab2_2.pptx
lab2_2.pptxlab2_2.pptx
lab2_2.pptx
RobelTsada
 
01c. Starting A Router
01c.  Starting A  Router01c.  Starting A  Router
01c. Starting A Router
Nghiep Lam
 
Basic config in Cisco router
Basic config in Cisco routerBasic config in Cisco router
Basic config in Cisco router
Hemnath R.
 
Basic Cisco Vishak Microsense
Basic Cisco Vishak MicrosenseBasic Cisco Vishak Microsense
Basic Cisco Vishak Microsense
Vishak Radhakrishnan
 
Mod11
Mod11Mod11
CCNA Icnd110 s04l04
CCNA Icnd110 s04l04CCNA Icnd110 s04l04
CCNA Icnd110 s04l04
computerlenguyen
 
第6讲 操作与配置Cisco Ios
第6讲 操作与配置Cisco Ios第6讲 操作与配置Cisco Ios
第6讲 操作与配置Cisco Ios
F.l. Yu
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystem
Betselove
 
General lab documentation~cisco router configuration
General lab documentation~cisco router configurationGeneral lab documentation~cisco router configuration
General lab documentation~cisco router configuration
sayedatif
 
Linux routing and firewall for beginners
Linux   routing and firewall for beginnersLinux   routing and firewall for beginners
Linux routing and firewall for beginners
n|u - The Open Security Community
 
5003361.ppt
5003361.ppt5003361.ppt
5003361.ppt
AdelfaJoycePagobo
 
CCNA ppt Day 4
CCNA ppt Day 4CCNA ppt Day 4
CCNA ppt Day 4
VISHNU N
 
Chapter 1 Switch Network Device (1).ppt
Chapter 1  Switch Network Device (1).pptChapter 1  Switch Network Device (1).ppt
Chapter 1 Switch Network Device (1).ppt
desalewminale
 
Day 5.2 startingarouter
Day 5.2 startingarouterDay 5.2 startingarouter
Day 5.2 startingarouter
CYBERINTELLIGENTS
 
Cisco config
Cisco configCisco config
Cisco config
Ayas Tincem
 
Cisco config
Cisco configCisco config
Cisco config
97148881557
 
test
testtest
test
sufwan
 

Similar to Data-communication-and-networking.pptx (20)

Day 5.3 configuration of router
Day 5.3 configuration of routerDay 5.3 configuration of router
Day 5.3 configuration of router
 
Switches lets expand our networks
Switches lets expand our networksSwitches lets expand our networks
Switches lets expand our networks
 
Basic Configurations on Router
Basic Configurations on RouterBasic Configurations on Router
Basic Configurations on Router
 
lab2_2.pptx
lab2_2.pptxlab2_2.pptx
lab2_2.pptx
 
01c. Starting A Router
01c.  Starting A  Router01c.  Starting A  Router
01c. Starting A Router
 
Basic config in Cisco router
Basic config in Cisco routerBasic config in Cisco router
Basic config in Cisco router
 
Basic Cisco Vishak Microsense
Basic Cisco Vishak MicrosenseBasic Cisco Vishak Microsense
Basic Cisco Vishak Microsense
 
Mod11
Mod11Mod11
Mod11
 
CCNA Icnd110 s04l04
CCNA Icnd110 s04l04CCNA Icnd110 s04l04
CCNA Icnd110 s04l04
 
第6讲 操作与配置Cisco Ios
第6讲 操作与配置Cisco Ios第6讲 操作与配置Cisco Ios
第6讲 操作与配置Cisco Ios
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystem
 
General lab documentation~cisco router configuration
General lab documentation~cisco router configurationGeneral lab documentation~cisco router configuration
General lab documentation~cisco router configuration
 
Linux routing and firewall for beginners
Linux   routing and firewall for beginnersLinux   routing and firewall for beginners
Linux routing and firewall for beginners
 
5003361.ppt
5003361.ppt5003361.ppt
5003361.ppt
 
CCNA ppt Day 4
CCNA ppt Day 4CCNA ppt Day 4
CCNA ppt Day 4
 
Chapter 1 Switch Network Device (1).ppt
Chapter 1  Switch Network Device (1).pptChapter 1  Switch Network Device (1).ppt
Chapter 1 Switch Network Device (1).ppt
 
Day 5.2 startingarouter
Day 5.2 startingarouterDay 5.2 startingarouter
Day 5.2 startingarouter
 
Cisco config
Cisco configCisco config
Cisco config
 
Cisco config
Cisco configCisco config
Cisco config
 
test
testtest
test
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

Data-communication-and-networking.pptx

  • 2. How are we in the meeting?  Our team behave well  Our team were curious  Our team have cooperation  Our team gave suggestions  Our team share knowledge  Our team was guided well  Our team gave understanding and considerations  Our team assess issues or inquiries right away  Our team was prepared to listen every meeting
  • 3. What are challenges and difficulties we face in the activity?  Unstable Internet connection  Factors cause by the typhoon  Frequent changes in schedule  Having little to no Idea about the topic  Gadgets malfunctions
  • 4. Did we succeed? Yes Definitely Why? We've worked as a team not just in discussion but in participation There’s a person who were assigned to discuss Someone to take screenshots for documentation Someone to write document and analyze the results Someone to make the presentation based on the documentation
  • 5. How Did We Configure A network?  Open Cisco Packet tracer  Login to start  First thing is to place all devices needed in a network
  • 6.  Connect all devices via straight through
  • 7.  Choose a pc to were you want to access the routers CLI, and connect it to the console port via cable
  • 8.  Access the Command line interface by opening that pc’s terminal
  • 9. COMMANDS USED IN NETWORK CONFIGURATION • Enable We used this command to enter the privilege EXEC mode • Disable To Exit all the way to User EXEC mode • Exit To Exit one mode at a time • Configure terminal To Enter Global Configuration mode • Hostname “ ” Change name of the router (host) • Banner motd $ $ Show message or warning before logging in • Enable secret “ ” Challenge a password upon enabling the Privilege EXEC mode
  • 10. • Line console 0 We use this specific mode to access the command to set password upon login • Line vty 0 4 We used this specific mode to access commands to set password for those who will attempt to connect remotely • Service password-encryption Encrypts all passwords COMMANDS USED IN NETWORK CONFIGURATION
  • 11. • Password “ ” login Used in specific mode to set passwords upon log in • Show running-config To show the changes in a current state of configuration • Show startup-config Shows the initial configuration of the system • Copy running-config startup-config Copies the changes in the running configuration to the startup-configuration COMMANDS USED IN NETWORK CONFIGURATION
  • 12. HERE ARE THE PROPER STEPS TO COMPLETE NETWORK CONFIGURATION: Setting Router Gateway Default Router>enable Router# Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface GigabitEthernet0/0/0 Router(config-if)#ip address 1.1.1.0 255.0.0.0 Router(config-if)#ip address 1.1.1.0 255.0.0.0 Router(config-if)#no shutdown
  • 13. Router(config-if)#exit Router(config)#interface GigabitEthernet0/0/1 Router(config-if)#ip address 2.2.2.0 255.0.0.0 Router(config-if)#ip address 2.2.2.0 255.0.0.0 Router(config-if)#no shutdown Router(config-if)#exit Router(config)
  • 14. How to Set Host Name Router>enable Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname grp7-R1-bldg1 grp7-R1-bldg1(config)#exit grp7-R1-bldg1# %SYS-5-CONFIG_I: Configured from console by console grp7-R1-bldg1#disable grp7-R1-bldg1>exit
  • 15. Change banner grp7-R1-bldg1>enable grp7-R1-bldg1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. grp7-R1-bldg1(config)#banner motd $Authorize personnel Only$ grp7-R1-bldg1(config)#banner motd $ Enter TEXT message. End with the character '$'. ============================================================ ***************Authrized Person Only************************ ============================================================$
  • 16. grp7-R1-bldg1(config)#exit grp7-R1-bldg1# %SYS-5-CONFIG_I: Configured from console by console grp7-R1-bldg1#disable grp7-R1-bldg1>exit
  • 17. Make password upon entry to user mode ============================================================ ***************Authorized Person Only************************ ============================================================ grp7-R1-bldg1>enable Password: grp7-R1-bldg1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. grp7-R1-bldg1(config)#line console 0
  • 19. Make password for remote access ============================================================ ***************Authorized Person Only************************ ============================================================ User Access Verification Password: grp7-R1-bldg1>enable Password: grp7-R1-bldg1#configure terminal Enter configuration commands, one per line. End with CNTL/Z.
  • 20. grp7-R1-bldg1(config)#line vty 0 4 grp7-R1-bldg1(config-line)#password 0000 grp7-R1-bldg1(config-line)#login grp7-R1-bldg1(config-line)#exit grp7-R1-bldg1(config)#exit grp7-R1-bldg1# %SYS-5-CONFIG_I: Configured from console by console grp7-R1-bldg1#disable grp7-R1-bldg1>exit
  • 21. Encrypt login (user EXEC) password and Remote access password ============================================================ ***************Authorized Person Only************************ ============================================================ User Access Verification Password: grp7-R1-bldg1>enable Password: grp7-R1-bldg1#configure terminal
  • 22. Enter configuration commands, one per line. End with CNTL/Z. grp7-R1-bldg1(config)#service password-encryption grp7-R1-bldg1(config)#exit grp7-R1-bldg1# %SYS-5-CONFIG_I: Configured from console by console grp7-R1-bldg1#disable grp7-R1-bldg1>exit
  • 23.
  • 24.
  • 25.